You are on page 1of 12

Remote

Control System Pricing Scheme


THIS DOCUMENTATION IS STRICTLY CONFIDENTIAL

Remote Control System Pricing Scheme Pricing Scheme

Important Notice
HT s.r.l. shall bear no responsibility or liability to a client or to any person or entity with respect to liability, loss or damage caused or
alleged to be caused directly or indirectly by any HT s.r.l. product. This includes, but is not limited to, any interruption of service, loss
of business or anticipatory profits or consequential damage resulting from the use or operation of any HT products. Information in this
document is subject to change without notice and does not represent a commitment on the part of HT s.r.l.
The systems described in this document are furnished under a license agreement or non-disclosure agreement.
All information included in this document, such as text, graphics, photos, logos and images, is the exclusive property of HT s.r.l. and
protected by international copyright laws. Permission is granted to view and photocopy (or print) materials from this document for
personal, non-commercial use only. Any other copying, distribution, retransmission or modification of the information in this document,
whether in electronic or hard copy form, without the express prior written permission of HT s.r.l., is strictly prohibited. In the event of
any permitted copying, redistribution or publication of copyrighted material, no changes in, or deletion of, author attribution, trademark
legend or copyright notice shall be made.
All contents of this document are: Copyright 2015 HT s.r.l. All rights reserved.

1-2

Copyright 2015 HackingTeam

Remote Control System Pricing Scheme Pricing Scheme

Table Of Contents
1 Overview

RCS Pricing Scheme


2.1 Basic Infrastructure
2.2 Platforms
2.3 Targets
2.4 Infection Vectors
2.5 Additional Options

3 Maintenance

Copyright 2014 HackingTeam

1-3

Remote Control System Pricing Scheme Pricing Scheme

Overview
Remote Control System solution is composed of different modules.
-

Main infrastructure
Platforms
Agents
Infection Vectors
Options

For a detailed explanation of each component and its role please refer to the Solution
Description document..

1-4

Copyright 2015 HackingTeam

Remote Control System Pricing Scheme Pricing Scheme

RCS Pricing Scheme

2.1

Main Infrastructure
The Remote Control System - Main Infrastructure includes all the components and main
features needed to implement essential functionalities. Security is a key value of Remote
Control System and is implemented

REMOTE CONTROL SYSTEM MAIN INFRASTRUCTURE


Description

Product
Code

Upfront License
Fees in euro

Galileo RCS Master Node


License for one (1) Master Node Server Software.
The Master Node is the Back-End server of Remote Control System. It comprises the
databases of agents, targets, evidences and operations, the storage and the business
logic of RCS. The Master Node consists of Shards that can be added in order to
increase response time and storage capacity.
Includes the license for one (1) Shard, equivalent to one (1) database server.
The Master Node includes the following key features:
Configuration of the Agents
Creation of Infection Vectors
Storage of Targets data (profile, devices, etc.)
Storage of Evidence (e.g., Skype and voice recording, chat and messages from
social networks, mail from clients and web interfaces, open files, screenshots,
visited web sites, passwords from browsers, mail clients, key-logging, on-screen
keyboards, clipboard texts, position, webcam photos, contacts, calendars, etc.)
Optical Character Recognition (OCR), crypto-currency (e.g., BitCoin) and file
metadata extraction tools (e.g., Word files author, JPG picture EXIF data)
,Role based access control (RBAC) for Administrator, Technician, Analysts,
System Admin user profiles
Audit trail
Ordinary and extraordinary system administration
Automatic distribution of data among Shards

RCS-MN

200.000

RCS-COL

120.000

Galileo RCS Collector


License for two (2) Collectors Server Software.
The RCS Collector is the Front-End server of Remote Control System. Collectors are
the points of presence of RCS on the Internet and are the sole components able to
communicate with Agents. Collectors can be added to expand the capacity of the
system in terms of number of concurrent agents that report back the collected
information. Having at least 2 Collectors provides you with redundancy in case of
failure, allowing Agents to continue reporting.
Includes the license for two (2) Collectors.
The Collector includes the following key features:
Secured communication flow management (encryption/decryption)
2-layer strong encryption with Agent authentication
Collection and storage of evidence
Fail-proof storage of evidence in case of Master Node temporary unavailability
Delivery of Infection Vectors to Targets (multi-stage infections)
Upgrade of Agents to new versions

Galileo RCS Anonymizers


License for three (3) Anonymizers Software.
Anonymizers insure the protection of the Collectors and the routing of the evidence to
the Collectors. Anonymizers can be replaced or substituted over time to avoid
exposure. You can adapt the number of Anonymizers for added security.
Includes the license for three (3) Anonymizers.

RCS-PR

50.000

The Anonymizers includes the following key features:


Safeguarding of the communication channels encryption
Routing of evidence through the Anonymizer chain
Protection of the Collector Internet address and identity
Copyright 2014 HackingTeam

2-5

Remote Control System Pricing Scheme Pricing Scheme

Galileo RCS User Console


License for ten (10) User Console Software.
The User Console is the Single Point of Control to perform all operations. Role based
access control is built-in and users can access features according to their privileges.
The User Console implements a powerful Graphical User Interface, combined with a
target-centric specific workflow and an easy to use logic,
Includes the license for up to 10 (10) active and concurrent Users.
The RCS User Console includes the following key features:
Graph-based representation of Target correlations
Targets digital profileDrag-and-drop advanced Agents configuration
Wizard for generating infection vectors
User administration
Audit trail

RCS-USR

50.000

RCS-PHI

50.000

RCS-ALM

40.000

RCS-PROF

70.000

RCS-MAINT

Included

Physical Infection Vectors


License for Physical Infection Vectors Software.
Physical Infection Vectors license allows you to use a range of methods to install the
Agents on the Targets devices by means of physical access (e.g., by USB
connectivity).
Availability of Infection Vectors is based on the licensed Platforms (e.g., if you
purchase Windows Platform, you automatically have all the Physical Infection Vectors
available for Windows).
Prerequisite: some Physical Infection Vectors may be available only with a Tactical
Network Injector license.

Alerting
License for Alerting Software.
Alerting allows you to be informed when a relevant event happens in the system (e.g.,
a new Agent synchronizes for the first time, evidence containing a specific keyword is
received, etc.). Alerts are visible in the Console and a notification can be sent via
email.

Target Profiling
License for Target Profiling Software.
Target profiling builds the complete Targets profile both in the digital and real world,
by aggregating all the relevant information in a single identity card.
The Target Profiling includes the following key features:
Digital accounts (e.g., Facebook, Google, Twitter, Skype, etc)
Most contacted people
Most visited websites
Last known position
st

1 Year Maintenance and Support


st

License for 1 Year Maintenance and Support.


st
1 Maintenance and Support entitles you to receive

TOTAL

2-6

Euro

580.000,00

Copyright 2015 HackingTeam

Remote Control System Pricing Scheme Pricing Scheme

2.2

Platforms
By platforms we mean the Operating Systems that RCS allows the customer to monitor.
The customer can add new platforms whenever its needed.

REMOTE CONTROL SYSTEM PLATFORMS PRICE LIST


Description

Product Code

Qty

Microsoft Windows Platform


License for Microsoft Windows platform.
The license allows you to infect Windows operating system by implanting an
Agent. The license includes support for Windows XP Service Pack 3/Vista/7/8,
on both 32-bit and 64-bit architectures.
The Microsoft Windows platform includes the following key features:
Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)
File capture
Camera snapshots
Key logging

RCS-WIN

30.000,00

RCS-MAC

30.000,00

RCS-LIN

30.000,00

Apple OS X Platform
License for Apple OS X platform.
The license allows you to infect OS X operating system by implanting an Agent.
The license includes support for OS X Snow Leopard and up to Yosemite.
The Apple OS X platform includes the following key features:
Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)
File capture
Camera snapshots
Key logging

Linux Platform
License for Linux platform.
The license allows you to infect Linux operating system by implanting an Agent.
The license includes support for Ubuntu, Debian, Mint.
The Linux platform includes the following key features:
Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)
File capture
Camera snapshots
Key logging

Android Platform
License for Android platform.
The license allows you to infect Android operating system by implanting an
Agent. The license includes support for Ubuntu, Debian, Mint.

40.000,00

RCS-AND

The Android platform includes the following key features:


Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Copyright 2014 HackingTeam

2-7

Remote Control System Pricing Scheme Pricing Scheme

Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)


File capture
Camera snapshots
Key logging

Apple iOS Platform

50.000,00

License for Apple iOS platform.


The license allows you to infect Apple iOS operating system by implanting an
Agent. The license includes support for iOS 4.x/5.x/6.x/7.x/8.1.
The Apple iOS platform includes the following key features:
Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)
File capture
Camera snapshots

RCS-IOS

Key logging

BlackBerry OS Platform

30.000,00

License for BlackBerry OS platform.


The license allows you to infect BlackBerry OS operating system by implanting
an Agent. The license includes support for BlackBerry OS 4/5/6/7.
The BlackBerry OS platform includes the following key features:
Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)
File capture
Camera snapshots

RCS-BB

Microsoft Windows Phone Platform


License for Microsoft Windows Phone platform.
The license allows you to infect Microsoft Windows Phone operating system by
implanting an Agent. The license includes support for Microsoft Windows Phone
8.0/8.1.
The Microsoft Windows Phone platform includes the following key features:
Skype call and chat
Facebook chat and check-ins
Gmail and Outlook.com
Crypto currency transactions (e.g., BitCoins, LiteCoin, etc)
File capture
Camera snapshots

2-8

RCS-WP

30.000,00

Copyright 2015 HackingTeam

Remote Control System Pricing Scheme Pricing Scheme

2.3

Agents

REMOTE CONTROL SYSTEM TARGET


Description

Product Code

10 Concurrent Agents

RCS-ASL10

50.000,00

RCS-ASL-25

100.000,00

RCS-ASL-50

160.000,00

RCS-ASL-100

250.000,00

RCS-ASL-200

400.000,00

License for ten (10) Concurrent Agents Software.


Concurrent Agents license allow you to receive evidence concurrently from 10
Agents. Concurrent Agents can be used for every kind of evidence available and
for an unlimited amount of time. Once you uninstall an Agent, its license can be
reused to collect evidence from another Targets device.

Qty

The licensed Agents can be used in any combination on the platforms that has
been licensed. There is no limit to the number of Agents you can install, however
only 10 Agents are allowed to transmit evidence. Additional agents can be
licensed at any time.

25 Concurrent Agents
License for twenty-five (25) Concurrent Agents Software.
Concurrent Agents license allow you to receive evidence concurrently from 25
Agents. Concurrent Agents can be used for every kind of evidence available and
for an unlimited amount of time. Once you uninstall an Agent, its license can be
reused to collect evidence from another Targets device.
The licensed Agents can be used in any combination on the platforms that has
been licensed. There is no limit to the number of Agents you can install, however
only 25 Agents are allowed to transmit evidence. Additional agents can be
licensed at any time.

50 Concurrent Agents
License for fifty (50) Concurrent Agents Software.
Concurrent Agents license allow you to receive evidence concurrently from 50
Agents. Concurrent Agents can be used for every kind of evidence available and
for an unlimited amount of time. Once you uninstall an Agent, its license can be
reused to collect evidence from another Targets device.
The licensed Agents can be used in any combination on the platforms that has
been licensed. There is no limit to the number of Agents you can install, however
only 50 Agents are allowed to transmit evidence. Additional agents can be
licensed at any time.

100 Concurrent Agents


License for one hundred (100) Concurrent Agents Software.
Concurrent Agents license allow you to receive evidence concurrently from 100
Agents. Concurrent Agents can be used for every kind of evidence available and
for an unlimited amount of time. Once you uninstall an Agent, its license can be
reused to collect evidence from another Targets device.
The licensed Agents can be used in any combination on the platforms that has
been licensed. There is no limit to the number of Agents you can install, however
only 100 Agents are allowed to transmit evidence. Additional agents can be
licensed at any time.

200 Concurrent Agents


License for two hundred (200) Concurrent Agents Software.
Concurrent Agents license allow you to receive evidence concurrently from 200
Agents. Concurrent Agents can be used for every kind of evidence available and
for an unlimited amount of time. Once you uninstall an Agent, its license can be
reused to collect evidence from another Targets device.
The licensed Agents can be used in any combination on the platforms that has
been licensed. There is no limit to the number of Agents you can install, however
only 200 Agents are allowed to transmit evidence. Additional agents can be
licensed at any time.

Copyright 2014 HackingTeam

2-9

Remote Control System Pricing Scheme Pricing Scheme

2.4

Infection Vectors
In order to install the Agents software on the Targets devices, the customer can take
advantage of several Infection Vectors that allow for remote installation.

RCS INFECTION VECTORS


Description

Product Code

Price

RCS-TNI

80.000,00

Network Injection Appliance 1Gb - ISP level (HW included)

RCS-NIA1

90.000,00

Network Injection Appliance 10Gb - ISP level (HW included)

RCS-NIA10

140.000,00

Tactical Network Injector


License for one (1) Tactical Network Injector.
Tactical Network Injector (TNI) is a portable solution to infect Targets in Wi-Fi and
cabled LAN environments. The TNI embed patent-pending Virtual Man-in-themiddle Technology that permits to operate without being inline, thus allowing
more effective and silent attacks. It features Wi-Fi protection bypass, target
identification and infection capabilities.
The Tactical Network Injector includes the following key features:
Patent-pending Virtual Man-in-the-middle Technology
Support for WEP, WPA/WPA2 and WPS protection
Real-time infection of visited websites and downloaded applications
Automatic injection of exploits in browsed websites
Hardware included: pre-configured laptop, dedicated network card with antennas,
extra batteries (up to 24h autonomy). Comes in a rugged case.

Remote Mobile Infection


License for one (1) Remote Mobile Infection.
Remote Mobile Infection (RMI) allows you to remotely infect Android and
BlackBerry smartphones by sending specially crafted messages.
Hardware included: pre-configured GSM modem.

RCS-RMI

30.000,00

Prerequisites: social engineering is highly recommended to make efficient use


of the RMI.

Exploit Delivery Service 1 Year Subscription


License for one (1) year subscription to Exploit Delivery Service (EDS).
EDS grants you access to a selection of 0-day exploit targeting different
applications.
The Exploit Delivery Service includes the following key features:
RiTe (RiTe is a Testing ecosystem) performing validity and security checks
daily (see RiTe description)
Exploit Delivery Network (EDN) managed by HT and hosted on anonymous
systems, providing a secure environment for serving exploits
Requests performed via secured online ticketing. As an example, a request
can consist of customer-provided application content (e.g., Word file) and
specific infection vector
Delivery of weaponized customers content (e.g., Word file with embedded
exploit), to be sent to the Target by the customer via customers Tactical
Network Injector or other means
Automatic delivery of multi-stage exploits components
Automatic deletion of all the stages and content from the EDN as soon as
the infection is complete

RCS-EDS1Y

120.000,00

The exploits availability and the service process can change without notice.
Prerequisites: the Targets device must run a combination of vulnerable versions
of the software targeted by the specific exploit (e.g., specific combination of
operating system and application).
Option: customer can manage an additional system that hides the Targets IP
address and sensible information from HT.

2-10

Copyright 2015 HackingTeam

Remote Control System Pricing Scheme Pricing Scheme

2.5

Additional Options
To take maximum advantage of your Remote Control System, the solution can be customized
according to Customers needs and requirements.
Like Platforms and Targets, also the additional features can be added whenever needed.

RCS OPTIONS

2.6

Description

Product Code

Price

Collector License

RCS-COL

40.000,00

Shard License

RCS-SH

60.000,00

Anonymizer License

RCS-PR

10.000,00

Intelligence License

RCS-ALM

100.000,00

Connector License

RCS-CONN

140.000,00

Additional Console User

RCS-USR

2.000,00

Description

Product Code

Price

Foundation Training (1 Week)

RCS-FTR

15.000,00
(T&A excluded)

Advanced Training (1 Week)

RCS-ATR

20.000,00
(T&A excluded)

On Site Assistance (1 Week)

RCS-ASS

20.000,00
(T&A excluded)

RCS-MAINT

20% of the total


amount
purchased

Professional Services
RCS OPTIONS

Yearly Maintenance Fee (from 2

Copyright 2014 HackingTeam

nd

year)

2-11

Remote Control System Pricing Scheme Pricing Scheme

Maintenance
The Maintenance refers to:
-

Software updates (e.g., bug fixing, improvements to platform support)


Invisibility updates
Dedicated Support through Web Ticketing System
RiTE (Rite-is-a-Testing Ecosystem):
o 500+ daily tests
o 50+ anti-virus tested
o 20+ applications tested

RCS MAINTENANCE
Description

Product Code

Yearly Maintenance Fee (from the second year)

RCS-Maint

3-12

Price
20% of the total
amount
purchased

Copyright 2015 HackingTeam

You might also like